Netinfo Security ›› 2018, Vol. 18 ›› Issue (9): 1-9.doi: 10.3969/j.issn.1671-1122.2018.09.001

• Orginal Article •     Next Articles

Review of Malicious Traffic Feature Extraction

Gang LU, Ronghua GUO, Ying ZHOU, Jun WANG   

  1. Chinese Luoyang Electronic Equipment Test Center, Luoyang Henan 471003, China
  • Received:2018-07-17 Online:2018-09-30 Published:2020-05-11

Abstract:

The frequent occurrence of new malware presents severe challenges in network security. It is necessary way to resolve this problem by extracting malicious traffic features. This paper systematically reviews the existing methods of malicious traffic feature extraction. Firstly, we introduce malicious traffic classes. Then, based on the principal line of the process of malicious traffic feature extraction, we generalize the recent works in four aspects: traffic acquisition, reverse analysis, feature generation, feature evaluation and optimization. Moreover, we detail the methods of malicious traffic feature extraction on smartphone and Internet of thing devices. Finally, we summarize the paper and discuss the future work in this research area.

Key words: network security, malicious traffic, feature extraction, feature detection, network behavior

CLC Number: